{"id":992,"date":"2021-03-01T10:35:00","date_gmt":"2021-03-01T16:35:00","guid":{"rendered":"https:\/\/idsinc.com\/?p=992"},"modified":"2026-03-05T17:02:59","modified_gmt":"2026-03-05T23:02:59","slug":"avanzar-rapidamente","status":"publish","type":"post","link":"https:\/\/idsinc.com\/es\/zoom-ahead\/","title":{"rendered":"Zoom adelante"},"content":{"rendered":"<p class=\"wp-block-paragraph\"><strong>Resumen<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Los artefactos que deja la aplicaci\u00f3n Zoom en Mac, PC y dispositivos m\u00f3viles var\u00edan con el tiempo.<\/li><li>En la primavera de 2020, notamos que estos artefactos se hab\u00edan reducido en el lado del cliente.<\/li><li>Sin embargo, investigaciones recientes sugieren que las bases de datos de nuestros dispositivos contienen muchos m\u00e1s puntos de datos y, por lo tanto, informaci\u00f3n \u00fatil tanto para los investigadores como para los litigantes; parece que acceder a estos datos se ha vuelto <em>muy dificil<\/em> a partir de ahora (invierno de 2021) <strong>debido a la nueva encriptaci\u00f3n.<\/strong><\/li><\/ol>\n\n\n\n<p class=\"wp-block-paragraph\">Los investigadores, los reguladores, los litigantes y todos los interesados saben que Zoom se utiliza tanto que ha sido y seguir\u00e1 siendo un punto focal en los ejercicios de clasificaci\u00f3n de datos durante alg\u00fan tiempo. En oto\u00f1o de 2020, Zoom anunci\u00f3 que ser\u00eda <a href=\"https:\/\/www.zdnet.com\/article\/zoom-rolls-out-encryption-for-all-desktop-and-mobile-users\/\">implementando el cifrado de extremo a extremo adecuado<\/a> para todos sus usuarios tradicionales de computadoras y dispositivos m\u00f3viles. Como recordatorio r\u00e1pido, el cifrado de extremo a extremo (E2E) es el m\u00e9todo mediante el cual los datos no solo se cifran <em>En tr\u00e1nsito<\/em> en todas las etapas, pero tambi\u00e9n en reposo en sus puntos finales (ordenadores, dispositivos m\u00f3viles, etc.). Esta es la raz\u00f3n principal por la que millones de personas acudieron en masa a Signal y Telegram en enero.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Investigar<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Gracias a <a href=\"https:\/\/www.linkedin.com\/posts\/tldata4n6_zooming-into-the-pandemic-a-forensic-analysis-activity-6759866659822944256-uhpP\">trabajo de investigadores forenses de datos en la comunidad<\/a>, los artefactos del lado del cliente de la plataforma Zoom se han aislado m\u00e1s rigurosamente entre varios entornos que van desde tel\u00e9fonos m\u00f3viles hasta PC y Mac (Cr\u00e9dito: Grupo de Investigaci\u00f3n e Investigaci\u00f3n Cibern\u00e9tica de la Universidad de New Haven). Esta investigaci\u00f3n refleja artefactos y datos almacenados por la aplicaci\u00f3n\/programa Zoom en el lado del cliente; si hay inter\u00e9s en los datos alojados por Zoom en el <em>lado del servidor<\/em>, <a href=\"https:\/\/content.idiscoverysolutions.com\/blog\/fun-facts-and-artefacts-part-ii?locale=en\">He comenzado a investigar y mirar en este<\/a>, sin embargo; mis esfuerzos han tenido poco retorno.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">El trabajo de investigaci\u00f3n analiz\u00f3 las versiones de PC con Windows (as\u00ed como Mac y dispositivos m\u00f3viles) tan recientes como la versi\u00f3n 5.1.2. y ya estamos en 5.5.0, con mi evaluaci\u00f3n realizada en 5.49. No hace falta decir que Zoom realiza actualizaciones semanales o incluso dos veces por semana en su aplicaci\u00f3n del lado del cliente. Si est\u00e1 del lado de Windows, creo que esto sucede autom\u00e1ticamente, mientras que los usuarios de Mac tienen que elegir hacerlo manualmente, a menos que sea un parche importante y sea forzado.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Bits t\u00e9cnicos<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">En el verano, muchos de los archivos de la base de datos del lado de la computadora parec\u00edan almacenar muy poca informaci\u00f3n, lo que parec\u00eda ser una desviaci\u00f3n de las variantes de la versi\u00f3n 3.x en las que los investigadores electr\u00f3nicos pod\u00edan obtener una gran cantidad de informaci\u00f3n sobre las sesiones de las reuniones. Mi pensamiento inicial fue que Zoom almacenaba menos de esto en las computadoras como puntos finales debido a un <strong>postura de cifrado relativamente semana <\/strong>en el nivel de punto final. A fines de la primavera o principios del verano de 2020, a medida que los bloqueos se normalizaban y m\u00e1s personas viv\u00edan en Zoom, la compa\u00f1\u00eda compr\u00f3 Keybase para la administraci\u00f3n de claves de cifrado y, en general, para reforzar el aspecto de seguridad de la informaci\u00f3n de su operaci\u00f3n (si tuviera que adivinar). La investigaci\u00f3n y los esfuerzos recientes de la Universidad parecen indicar un cambio hacia el almacenamiento de datos del lado del cliente y el advenimiento del cifrado en reposo, que abordar\u00e9 en un momento. En el documento, varias bases de datos vinculadas a cuentas de usuario individuales de Zoom (por ejemplo, si mi esposa y yo us\u00e1ramos Zoom en esta computadora, ambas cuentas tendr\u00edan su propia &#039;ID de perfil&#039; y bases de datos almacenadas all\u00ed), parec\u00eda haber montones de datos que no hab\u00eda presenciado desde versiones mucho anteriores de Zoom. Hab\u00eda decidido err\u00f3neamente que Zoom mantendr\u00eda <em>todo<\/em> datos en el lado del servidor de forma indefinida, pero este movimiento hacia el cifrado de clave privada\/secreta localizado est\u00e1 m\u00e1s en l\u00ednea con las tendencias del mercado (Apple et al.,).&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Quer\u00eda ver algunos de estos datos por m\u00ed mismo (\u00a1\u00bfpor qu\u00e9 no iba a hacerlo?!), as\u00ed que analic\u00e9 estos datos en una de mis Mac con mi perfil de Zoom para aislar las bases de datos, mientras relam\u00eda mis labios con anticipaci\u00f3n. Para mi consternaci\u00f3n, estos datos estaban encriptados, pero como defensor de la privacidad y la seguridad de los datos, tambi\u00e9n estaba satisfecho. Zoom tambi\u00e9n se tom\u00f3 la libertad de nombrar los archivos de la base de datos ahora encriptados de una manera intuitiva y transparente agregando &#039;encks&#039; a cada uno.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"188\" src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/Zoom-application-encrypted-data-1024x188.png\" alt=\"\" class=\"wp-image-993\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/Zoom-application-encrypted-data-1024x188.png 1024w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/Zoom-application-encrypted-data-300x55.png 300w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/Zoom-application-encrypted-data-768x141.png 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/Zoom-application-encrypted-data-1536x282.png 1536w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/Zoom-application-encrypted-data-16x3.png 16w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/Zoom-application-encrypted-data.png 1595w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em><strong>Bonito.<\/strong><\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"860\" height=\"934\" src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/Zoom-application-encrypted-data2.png\" alt=\"\" class=\"wp-image-994\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/Zoom-application-encrypted-data2.png 860w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/Zoom-application-encrypted-data2-276x300.png 276w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/Zoom-application-encrypted-data2-768x834.png 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/Zoom-application-encrypted-data2-11x12.png 11w\" sizes=\"auto, (max-width: 860px) 100vw, 860px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>\u00bfEsto te parece basura? Deber\u00eda.<\/em> <em>Esta es su encriptaci\u00f3n en el trabajo.<\/em> <br><em>Cifrado SQL 4? Esa es mi apuesta.<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Ahora estoy en medio de un gran y confuso viaje de explotaci\u00f3n de datos, cuyos resultados no puedo predecir. Si tenemos alg\u00fan \u00e9xito en el acceso a estos artefactos de datos ahora que est\u00e1n encriptados, estamos ansiosos por compartir ese \u00e9xito. Si no recibe noticias m\u00edas en las pr\u00f3ximas semanas y meses, puede asumir con raz\u00f3n que me estoy marinando en la derrota. Mira este espacio.<\/p>\n\n\n\n<hr class=\"wp-block-separator is-style-wide\"\/>\n\n\n\n<p class=\"wp-block-paragraph\"><em><strong>iDiscovery Solutions es una firma de consultor\u00eda estrat\u00e9gica, tecnolog\u00eda y servicios expertos que ofrece soluciones personalizadas de eDiscovery, desde an\u00e1lisis forense digital hasta testimonios de expertos para bufetes de abogados y corporaciones en los Estados Unidos y Europa.<\/strong><\/em><\/p>\n\n\n<!-- wp:themify-builder\/canvas \/-->\n\n\n<p class=\"wp-block-paragraph\"><\/p>","protected":false},"excerpt":{"rendered":"<p>Summary Artefacts left behind on Macs, PCs and mobile devices by the Zoom application are varied over time. In the Spring of 2020 we discerned these artefacts had been reduced on the client-side. Recent research suggests databases on our devices contain a lot more data points and thus useful information to investigators and litigators alike, [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":996,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,30],"tags":[],"class_list":["post-992","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-digital-evidence","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Zoom Ahead (Zoom Application Data Storage) - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"Zoom announced end-to-end encryption for computer &amp; mobile device users. Data forensic research could show data stored by Zoom, server-side.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/es\/avanzar-rapidamente\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zoom Ahead\" \/>\n<meta property=\"og:description\" content=\"Zoom announced end-to-end encryption for computer &amp; mobile device users. Data forensic research could show data stored by Zoom, server-side.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/es\/avanzar-rapidamente\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-01T16:35:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-05T23:02:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/ZoomAhead-ids-e1614270890867.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Timothy LaTulippe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Timothy LaTulippe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/zoom-ahead\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/zoom-ahead\\\/\"},\"author\":{\"name\":\"Timothy LaTulippe\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/52569befd821087dea6c4f73055638b7\"},\"headline\":\"Zoom Ahead\",\"datePublished\":\"2021-03-01T16:35:00+00:00\",\"dateModified\":\"2026-03-05T23:02:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/zoom-ahead\\\/\"},\"wordCount\":804,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/zoom-ahead\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/ZoomAhead-ids-e1614270890867.jpg\",\"articleSection\":[\"Blog\",\"Digital Evidence + Data Authenticity\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/zoom-ahead\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/zoom-ahead\\\/\",\"name\":\"Zoom Ahead (Zoom Application Data Storage) - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/zoom-ahead\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/zoom-ahead\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/ZoomAhead-ids-e1614270890867.jpg\",\"datePublished\":\"2021-03-01T16:35:00+00:00\",\"dateModified\":\"2026-03-05T23:02:59+00:00\",\"description\":\"Zoom announced end-to-end encryption for computer & mobile device users. Data forensic research could show data stored by Zoom, server-side.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/zoom-ahead\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/zoom-ahead\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/zoom-ahead\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/ZoomAhead-ids-e1614270890867.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/ZoomAhead-ids-e1614270890867.jpg\",\"width\":1500,\"height\":750,\"caption\":\"Zoom announced end-to-end encryption for computer & mobile device users. Data forensic research could show data stored by Zoom, server-side.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/zoom-ahead\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Digital Evidence + Data Authenticity\",\"item\":\"https:\\\/\\\/idsinc.com\\\/category\\\/blog\\\/digital-evidence\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Zoom Ahead\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/52569befd821087dea6c4f73055638b7\",\"name\":\"Timothy LaTulippe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/50d0e19660fd05d2e10293446ec5a945654a9f268e4d679f55cb53cd3a7b4e6c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/50d0e19660fd05d2e10293446ec5a945654a9f268e4d679f55cb53cd3a7b4e6c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/50d0e19660fd05d2e10293446ec5a945654a9f268e4d679f55cb53cd3a7b4e6c?s=96&d=mm&r=g\",\"caption\":\"Timothy LaTulippe\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/es\\\/author\\\/timothy\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Zoom Ahead (almacenamiento de datos de aplicaciones Zoom) - iDiscovery Solutions","description":"Zoom anunci\u00f3 cifrado de extremo a extremo para usuarios de computadoras y dispositivos m\u00f3viles. La investigaci\u00f3n forense de datos podr\u00eda mostrar datos almacenados por Zoom, en el lado del servidor.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/es\/avanzar-rapidamente\/","og_locale":"es_ES","og_type":"article","og_title":"Zoom Ahead","og_description":"Zoom announced end-to-end encryption for computer & mobile device users. Data forensic research could show data stored by Zoom, server-side.","og_url":"https:\/\/idsinc.com\/es\/avanzar-rapidamente\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2021-03-01T16:35:00+00:00","article_modified_time":"2026-03-05T23:02:59+00:00","og_image":[{"width":1500,"height":750,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/ZoomAhead-ids-e1614270890867.jpg","type":"image\/jpeg"}],"author":"Timothy LaTulippe","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Timothy LaTulippe","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/idsinc.com\/zoom-ahead\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/zoom-ahead\/"},"author":{"name":"Timothy LaTulippe","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/52569befd821087dea6c4f73055638b7"},"headline":"Zoom Ahead","datePublished":"2021-03-01T16:35:00+00:00","dateModified":"2026-03-05T23:02:59+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/zoom-ahead\/"},"wordCount":804,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/zoom-ahead\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/ZoomAhead-ids-e1614270890867.jpg","articleSection":["Blog","Digital Evidence + Data Authenticity"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/zoom-ahead\/","url":"https:\/\/idsinc.com\/zoom-ahead\/","name":"Zoom Ahead (almacenamiento de datos de aplicaciones Zoom) - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/zoom-ahead\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/zoom-ahead\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/ZoomAhead-ids-e1614270890867.jpg","datePublished":"2021-03-01T16:35:00+00:00","dateModified":"2026-03-05T23:02:59+00:00","description":"Zoom anunci\u00f3 cifrado de extremo a extremo para usuarios de computadoras y dispositivos m\u00f3viles. La investigaci\u00f3n forense de datos podr\u00eda mostrar datos almacenados por Zoom, en el lado del servidor.","breadcrumb":{"@id":"https:\/\/idsinc.com\/zoom-ahead\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/zoom-ahead\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/zoom-ahead\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/ZoomAhead-ids-e1614270890867.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/ZoomAhead-ids-e1614270890867.jpg","width":1500,"height":750,"caption":"Zoom announced end-to-end encryption for computer & mobile device users. Data forensic research could show data stored by Zoom, server-side."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/zoom-ahead\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Digital Evidence + Data Authenticity","item":"https:\/\/idsinc.com\/category\/blog\/digital-evidence\/"},{"@type":"ListItem","position":4,"name":"Zoom Ahead"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Soluciones iDiscovery","description":"Utilice los datos a su favor en la sala del tribunal","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Soluciones iDiscovery","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS ofrece soluciones de datos consultivas a corporaciones y bufetes de abogados de todo el mundo, lo que les otorga una ventaja decisiva, tanto dentro como fuera de los tribunales. Los expertos en la materia y los estrategas de datos de iDS se especializan en encontrar soluciones a problemas de datos complejos, garantizando que los datos puedan aprovecharse como un activo, no como un pasivo.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/52569befd821087dea6c4f73055638b7","name":"Timoteo LaTulippe","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/50d0e19660fd05d2e10293446ec5a945654a9f268e4d679f55cb53cd3a7b4e6c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/50d0e19660fd05d2e10293446ec5a945654a9f268e4d679f55cb53cd3a7b4e6c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/50d0e19660fd05d2e10293446ec5a945654a9f268e4d679f55cb53cd3a7b4e6c?s=96&d=mm&r=g","caption":"Timothy LaTulippe"},"url":"https:\/\/idsinc.com\/es\/author\/timothy\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/992","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/comments?post=992"}],"version-history":[{"count":1,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/992\/revisions"}],"predecessor-version":[{"id":9438,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/992\/revisions\/9438"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media\/996"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media?parent=992"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/categories?post=992"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/tags?post=992"}],"curies":[{"name":"gracias","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}